Father Compromises Trezor Seed Phrase via Phishing Site—Permanent Loss
BlockedNo documentation described the custody setup — recovery without the owner's knowledge was not possible.
A father received a Trezor hardware wallet from his son as an upgrade from Coinbase exchange custody, where the son had experienced multiple password compromises. During the handoff, the son provided explicit, repeated warnings: do not type the 24-word seed phrase anywhere, do not photograph it, and do not operate the device without assistance. Written documentation reinforced these instructions.
Days later, while the son was on vacation, the father attempted independent access to his wallet and became convinced he was locked out or misconfigured. He searched online for help and navigated to what he believed was the official Trezor website. The site was a phishing lookalike, designed to harvest recovery seed phrases. Prompted by the fraudulent interface, the father entered all 24 words—directly contradicting the explicit warnings he had acknowledged.
Once the seed phrase was entered into a third-party site, anyone with that data could now spend the Bitcoin. The attack succeeded through a confluence of two failures: a critical knowledge gap in the owner's understanding of cryptocurrency security protocols, and his vulnerability to social engineering when attempting problem-solving independently. The son's custody strategy—cold storage hardware wallet with written instructions—was sound in principle but assumed operational discipline from a user unlikely to possess it.
No watching-only wallet had been configured to permit safe balance checking. No troubleshooting procedure was established for situations where the father felt unable to access his funds. The case demonstrates that hardware wallets, while superior to exchange custody for technical users, introduce new operational risks when deployed to non-technical owners who may not internalize security prohibitions or understand the irreversibility of seed phrase exposure.
| Stress condition | Documentation absent |
| Custody system | Hardware wallet (single key) |
| Outcome | Blocked |
| Documentation | Partial |
What the absence of documentation actually removes
What documentation provides is a starting point. Without it, heirs face three unknowns before they face any access problem: does the Bitcoin exist, where is it held, and what is needed to access it. Most of this information cannot be reconstructed after the owner dies or becomes incapacitated. Educated guesses, blockchain searches, and device inventories occasionally locate wallets — but without credentials, finding the wallet does not help.
Cases in this archive where documentation was absent but recovery succeeded typically involved one of two factors: an exchange account where the heir knew the email address and could navigate the account recovery process, or a designated person who had been given credentials informally and could act. Self-custody without any documentation or designated knowledge-holder is consistently the worst combination.
The content of documentation matters as much as its existence. A note that says "my Bitcoin is in a hardware wallet in the safe" is better than nothing but insufficient. Effective documentation specifies: what type of wallet, where the seed phrase is stored, whether a passphrase exists and where it is documented, and any exchange accounts and the email addresses used. It should be tested — the executor should be able to confirm the information is accurate before it is needed.
Documentation does not need to expose credentials to be useful. A document that describes the custody structure, points to where credentials are stored, and names a person who has been briefed can be stored without security risk. The goal is not to put the seed phrase in a filing cabinet — it is to ensure the executor has a map, not a blank wall.
Translate